Great

I've been doing this for a while but haven't been able to figure out how to do one thing. If I make a -R or -L tunnel either one, the endpoint is the only machine that can connect to it. It's as if incoming connections are only valid from localhost and not other local machines on the LAN.

I've got a few customers with firewalls and NO open hole for me to be able to SSH in to their server. I dial in via analog modem, create a reverse SSH tunnel to one of my servers and can then get through to their server easily. Most of their firewalls timeout sessions after so much inavtivity. So I use 'screen' and start 'top' or a 'ping' or something to keep the session active :)

I'd just like to be able to setup SecureCRT on my Wintel box to ssh to port 2000 on a Linux server with an active SSH tunnel and end up with a login on a remote server.

Port Forwarding

Sometimes port forwarding doesn't work if the remote server rejects the forwarded packets. I set this up using Putty. After loggin in, and attempting to use the forwarded port, I got: "Forwarded connection refused by server", in Putty's event log.

Very helpful setup info

I switched from "real" SSH server to OpenSSH when the licensing rules changed. OpenSSH don't offer a quickstart document, but the article goes a long way to fulfilling this, and enabled me to set up a working system again. Thanks for that !

Secure Tunnelling with SSH

April 02, 2003
You probably already know how to use SSH to securely log in to remote hosts over the Web. In this article, take things a little further by using SSH to encrypt connections to other ports as well. Scenarios covered include securing your mail server connection so that your mail password is always protected and creating secure pathways through firewalls for trusted hosts. Read the article .

Please discuss this article in this thread. You can read the article here .